<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Top 10 Security Precautions when using Social Networking Sites</title>
	<atom:link href="http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-10-security-precautions-social-networking-sites</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-14291</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 24 Nov 2010 13:26:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-14291</guid>
		<description><![CDATA[@Paul, 

What you&#039;re saying is true; however, you must consider 2 other scenarios that you have overlooked. 

1. What if the employee finds a way around the employer&#039;s technical enforcement and still accesses prohibited sites without the employer finding out?

2. (more likely) What about the employee&#039;s access during his free time outside of work? What if an employee has the bad habit of using the same password everywhere and signs up for some malicious application using the same password which he uses to access the corporate network?

Employees who are not technical can place your network in jeopardy not only when they&#039;re at work but everywhere and at any time. In my opinion neglecting to educate employees because they&#039;re only allowed to access the Internet for strict work related purposes is in itself a security risk.]]></description>
		<content:encoded><![CDATA[<p>@Paul, </p>
<p>What you&#8217;re saying is true; however, you must consider 2 other scenarios that you have overlooked. </p>
<p>1. What if the employee finds a way around the employer&#8217;s technical enforcement and still accesses prohibited sites without the employer finding out?</p>
<p>2. (more likely) What about the employee&#8217;s access during his free time outside of work? What if an employee has the bad habit of using the same password everywhere and signs up for some malicious application using the same password which he uses to access the corporate network?</p>
<p>Employees who are not technical can place your network in jeopardy not only when they&#8217;re at work but everywhere and at any time. In my opinion neglecting to educate employees because they&#8217;re only allowed to access the Internet for strict work related purposes is in itself a security risk.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Paul</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-10165</link>
		<dc:creator>Paul</dc:creator>
		<pubDate>Mon, 20 Sep 2010 11:32:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-10165</guid>
		<description><![CDATA[The 10 precautions listed in the opening argument of this article would have no relevance to an employer who has set down the law before an employee joins. The company pays you to work on a structured network of their choosing. Any violation of that trust is deemed a sack able offense on the spot with some of my clients&#039;. Collect your things and don&#039;t come back. The IT professionals in charge do not have the time to waste with idiots that do not understand the implications of their actions upon the security of the company&#039;s data network. Work is for work, social networking sites are not. Who gives a proverbial if you whine and moan about not having &quot;your&quot; sites available. The company&#039;s data is more important, without it you don&#039;t have a job. 
Any IT professional will tell you, they lock down user privileges to what is usable, and nothing more, this includes social sites.
If they don&#039;t, they will be looking for another job.
Time for people to grow up and realize that they at work to work.]]></description>
		<content:encoded><![CDATA[<p>The 10 precautions listed in the opening argument of this article would have no relevance to an employer who has set down the law before an employee joins. The company pays you to work on a structured network of their choosing. Any violation of that trust is deemed a sack able offense on the spot with some of my clients&#8217;. Collect your things and don&#8217;t come back. The IT professionals in charge do not have the time to waste with idiots that do not understand the implications of their actions upon the security of the company&#8217;s data network. Work is for work, social networking sites are not. Who gives a proverbial if you whine and moan about not having &#8220;your&#8221; sites available. The company&#8217;s data is more important, without it you don&#8217;t have a job.<br />
Any IT professional will tell you, they lock down user privileges to what is usable, and nothing more, this includes social sites.<br />
If they don&#8217;t, they will be looking for another job.<br />
Time for people to grow up and realize that they at work to work.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-9078</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 13 Aug 2010 12:36:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-9078</guid>
		<description><![CDATA[Damon B

Indeed a lot of people who aren&#039;t security aware tend to use the same password everywhere. Sometimes because they don&#039;t know better and something it&#039;s because they&#039;re afraid if they choose something new they&#039;re going to forget it and so they use the same old password which they know well. 

@ Elizabeth

That is certainly something to be expected. As I mentioned above when one chooses a password, especially when they don&#039;t have an IT Background, they will think about something which they will not forget. This is generally related to what they love the most. It&#039;s actually amazing that she mixed her pet&#039;s name with her birth year as I bet most of the time you would simply get pet names without additional detail as the additional detail would make the password harder to remember. In any case excellent work in getting your co-worker to strengthen her password!]]></description>
		<content:encoded><![CDATA[<p>Damon B</p>
<p>Indeed a lot of people who aren&#8217;t security aware tend to use the same password everywhere. Sometimes because they don&#8217;t know better and something it&#8217;s because they&#8217;re afraid if they choose something new they&#8217;re going to forget it and so they use the same old password which they know well. </p>
<p>@ Elizabeth</p>
<p>That is certainly something to be expected. As I mentioned above when one chooses a password, especially when they don&#8217;t have an IT Background, they will think about something which they will not forget. This is generally related to what they love the most. It&#8217;s actually amazing that she mixed her pet&#8217;s name with her birth year as I bet most of the time you would simply get pet names without additional detail as the additional detail would make the password harder to remember. In any case excellent work in getting your co-worker to strengthen her password!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Elizabeth Sams</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-8987</link>
		<dc:creator>Elizabeth Sams</dc:creator>
		<pubDate>Wed, 11 Aug 2010 12:39:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-8987</guid>
		<description><![CDATA[As utterly ridiculous as number 4 sounds, I’ve actually come across a co-worker who had been proven guilty of something like this. Granted she doesn’t have any IT background whatsoever, and is one of the most lax individuals when it comes to internet security, we managed to open up her different social networking profiles by using her pet’s name mixed with her birth year as the password. 

Her love for her dog was quite obvious, and would not let a day go by without telling us his name. It took us about three tries to crack the coder, but we made sure to tell her about it afterwards. I can’t imagine what would’ve happened if someone with more malicious intentions got a hold of that kind of information.]]></description>
		<content:encoded><![CDATA[<p>As utterly ridiculous as number 4 sounds, I’ve actually come across a co-worker who had been proven guilty of something like this. Granted she doesn’t have any IT background whatsoever, and is one of the most lax individuals when it comes to internet security, we managed to open up her different social networking profiles by using her pet’s name mixed with her birth year as the password. </p>
<p>Her love for her dog was quite obvious, and would not let a day go by without telling us his name. It took us about three tries to crack the coder, but we made sure to tell her about it afterwards. I can’t imagine what would’ve happened if someone with more malicious intentions got a hold of that kind of information.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Matthew Cheng</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-8984</link>
		<dc:creator>Matthew Cheng</dc:creator>
		<pubDate>Wed, 11 Aug 2010 12:16:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-8984</guid>
		<description><![CDATA[@Karrie Albert

I think the same can be said about Twitter. With a lot of third party websites allowing a whole array of different services, a lot of Twitter users are jumping on the bandwagon, giving these sites unrestricted access to their accounts. And if these suspicious sites can retrieve your password information and link it to your other social networking profiles, you just willingly gave out full-access to your entire online identity by clicking “Accept.”]]></description>
		<content:encoded><![CDATA[<p>@Karrie Albert</p>
<p>I think the same can be said about Twitter. With a lot of third party websites allowing a whole array of different services, a lot of Twitter users are jumping on the bandwagon, giving these sites unrestricted access to their accounts. And if these suspicious sites can retrieve your password information and link it to your other social networking profiles, you just willingly gave out full-access to your entire online identity by clicking “Accept.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Damon B</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-8982</link>
		<dc:creator>Damon B</dc:creator>
		<pubDate>Wed, 11 Aug 2010 12:06:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-8982</guid>
		<description><![CDATA[“Never use the same passwords that you use at work on a social networking site.”

I found this quite apt seeing that it’s the top of the list. After doing a survey on the security practices of one of our client’s employees, we’ve discovered that 9 out of 10 of them use the same passwords for their work, their e-mail and their social networking sites. It’s identity theft waiting to happen, and though it was only one company we looked at, we wouldn’t be surprised if this was a trend in a lot of other corporations.]]></description>
		<content:encoded><![CDATA[<p>“Never use the same passwords that you use at work on a social networking site.”</p>
<p>I found this quite apt seeing that it’s the top of the list. After doing a survey on the security practices of one of our client’s employees, we’ve discovered that 9 out of 10 of them use the same passwords for their work, their e-mail and their social networking sites. It’s identity theft waiting to happen, and though it was only one company we looked at, we wouldn’t be surprised if this was a trend in a lot of other corporations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-8513</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 30 Jul 2010 10:33:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-8513</guid>
		<description><![CDATA[I completely agree with Karrie; it is essential to be careful with what one installs on social networking sites as well. There are reports of malware installing trojans on your computer through Facebook.

@Carmel

There are ways to ensure these security checks aren&#039;t circumvented, obviously you can never be sure it will be 100% effective but it can get quite close. It always depends on your setup and what you want to allow and deny. Generally having one Internet gateway and controlling access through that works best. If you want maximum security you could use a white list approach allowing the firewall at the gateway to only allow access on port 80 and only to those sites you want to allow. Additionally another option is to monitor what people visit and when somebody circumvents the technology he can still be disciplined for breaking the policy. Employees need to learn that the block is there to enforce the policy and going around it does not make the action right, it makes things worse.]]></description>
		<content:encoded><![CDATA[<p>I completely agree with Karrie; it is essential to be careful with what one installs on social networking sites as well. There are reports of malware installing trojans on your computer through Facebook.</p>
<p>@Carmel</p>
<p>There are ways to ensure these security checks aren&#8217;t circumvented, obviously you can never be sure it will be 100% effective but it can get quite close. It always depends on your setup and what you want to allow and deny. Generally having one Internet gateway and controlling access through that works best. If you want maximum security you could use a white list approach allowing the firewall at the gateway to only allow access on port 80 and only to those sites you want to allow. Additionally another option is to monitor what people visit and when somebody circumvents the technology he can still be disciplined for breaking the policy. Employees need to learn that the block is there to enforce the policy and going around it does not make the action right, it makes things worse.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Carmel Amelia</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-8480</link>
		<dc:creator>Carmel Amelia</dc:creator>
		<pubDate>Thu, 29 Jul 2010 19:53:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-8480</guid>
		<description><![CDATA[&quot;When you have resourceful (and smart) employees, it&#039;s almost impossible to deny them access to any site. Our IT person at work tried to block all access to restricted sites (social networking sites included)but someone always finds a way to work around it and the next week, everyone are able to (secretly) access Facebook and Twitter again.

Is there a fool-proof way to deny access to specific sites?]]></description>
		<content:encoded><![CDATA[<p>&#8220;When you have resourceful (and smart) employees, it&#8217;s almost impossible to deny them access to any site. Our IT person at work tried to block all access to restricted sites (social networking sites included)but someone always finds a way to work around it and the next week, everyone are able to (secretly) access Facebook and Twitter again.</p>
<p>Is there a fool-proof way to deny access to specific sites?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Karrie Albert</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-8479</link>
		<dc:creator>Karrie Albert</dc:creator>
		<pubDate>Thu, 29 Jul 2010 19:49:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-8479</guid>
		<description><![CDATA[Another suggestion: 

Don&#039;t install applications such as those that claim to make you find out who&#039;s checking your profile as Facebook doesn&#039;t support that feature and will not allow a 3rd party app to do so. It might just pose a risk to your system. Next thing you know, your account &quot;posts&quot; status updates that you did not create.

Facebook is becoming a hacker heaven. If you use such social sites, steps should be taken to ensure your system and even your identity is protected.]]></description>
		<content:encoded><![CDATA[<p>Another suggestion: </p>
<p>Don&#8217;t install applications such as those that claim to make you find out who&#8217;s checking your profile as Facebook doesn&#8217;t support that feature and will not allow a 3rd party app to do so. It might just pose a risk to your system. Next thing you know, your account &#8220;posts&#8221; status updates that you did not create.</p>
<p>Facebook is becoming a hacker heaven. If you use such social sites, steps should be taken to ensure your system and even your identity is protected.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/top-10-security-precautions-social-networking-sites/comment-page-1/#comment-8434</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Thu, 29 Jul 2010 05:44:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2542#comment-8434</guid>
		<description><![CDATA[In light of the recent news that over 100 million Facebook profiles are now available for download on BitTorrent, I&#039;d like to add never ever have your profile set to public. Lock it down so that only your friends can see your info.

I also advise thinking carefully before adding your boss to your friends list. The net is full of stories about people who added their boss to their friends list, forgot, and got busted (and in some cases fired!) when they posted a status bashing their workplace!]]></description>
		<content:encoded><![CDATA[<p>In light of the recent news that over 100 million Facebook profiles are now available for download on BitTorrent, I&#8217;d like to add never ever have your profile set to public. Lock it down so that only your friends can see your info.</p>
<p>I also advise thinking carefully before adding your boss to your friends list. The net is full of stories about people who added their boss to their friends list, forgot, and got busted (and in some cases fired!) when they posted a status bashing their workplace!</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 06:19:59 by W3 Total Cache --